First published: Tue Mar 24 2020(Updated: )
A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.4 and iPadOS 13.4, tvOS 13.4, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. A download's origin may be incorrectly associated.
Credit: Ryan Pickren (ryanpickren.com) product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Mobile Safari | <13.1 | 13.1 |
Apple iCloud for Windows | <7.18 | |
Apple iCloud for Windows | >=10.0.0<10.9.3 | |
Apple iTunes for Windows | <12.10.5 | |
Apple Mobile Safari | <13.1 | |
iPadOS | <13.4 | |
iOS | <13.4 | |
tvOS | <13.4 | |
tvOS | <13.4 | 13.4 |
Apple iOS, iPadOS, and watchOS | <13.4 | 13.4 |
Apple iOS, iPadOS, and watchOS | <13.4 | 13.4 |
Apple iCloud | <10.9.3 | 10.9.3 |
Apple iCloud | <7.18 | 7.18 |
Apple iTunes | <12.10.5 | 12.10.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
The vulnerability ID is CVE-2020-3887.
tvOS 13.4, Safari 13.1, iOS 13.4, iPadOS 13.4, iCloud for Windows 10.9.3, iCloud for Windows 7.18, and iTunes for Windows 12.10.5 are affected.
The severity level of this vulnerability is not mentioned.
Apple has addressed the vulnerability with improved restrictions. It is recommended to update to the latest software versions mentioned in the affected software section to mitigate the risk.
You can find more information about this vulnerability on the official Apple support page. Here are some references: [1](https://support.apple.com/en-us/HT211104), [2](https://support.apple.com/en-us/HT211102), [3](https://support.apple.com/en-us/HT211101)